Analysis
-
max time kernel
30s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 17:07
Static task
static1
Behavioral task
behavioral1
Sample
conhost.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
conhost.exe
Resource
win10v2004-20230220-en
General
-
Target
conhost.exe
-
Size
4.0MB
-
MD5
feccda803ece2e7a3b7e9798714ad47e
-
SHA1
e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
-
SHA256
14529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
-
SHA512
dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
SSDEEP
49152:jEjwvlIKv05z+UERnIcYmWjc3Cdh+5E9UFiqeb0/B1:RlhWzZ6hjEciqe
Malware Config
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1200 conhost.exe 1200 conhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1732 1200 conhost.exe 28 PID 1200 wrote to memory of 1732 1200 conhost.exe 28 PID 1200 wrote to memory of 1732 1200 conhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707.6MB
MD556c8b0a7bfad695aefdff2cf5f28436d
SHA11852b8c01458c4635e3c67d449705716c5829096
SHA256ab9ddd5220265d1864c5f6b70bc7876fb3714c4df572a7e3976d08b314c20150
SHA51213620afb2a52dc13efddf8e2d53aa132ed2b75b7ccbe7f48739fcf7068fc6efc6cd4864da5c495acb4bdd4d4b28282026da31d7682e86d6a7cba48412c44ed62
-
Filesize
561.7MB
MD55623b3c2d7b61c3b497dec8b45cf3127
SHA163dd1e90a17cbea7efc8e00458f4dfd1517248f3
SHA2567ee02a32f7ee0b787fb75148181d10c75b9171b6ec368df709ced93c476f39bc
SHA512f372532289d191cadd9a943309019f85747704aad68d31eb73b033050d00e21c8337b33fc5701fe5bfa4c0f8adc9cadd605e7ab2a95c5a0e127533f7aada41b4
-
Filesize
606.6MB
MD53f96696828138d3d958444e87908f930
SHA15423c29c0b7da5d9a84264a58ac30e26acb94caf
SHA2561ed43e92c9301c13eac737e3cbdcf34e11cbed0d71bf860900fc918548c228d8
SHA512c3950a5a6d238ad10c80b396e81362e6feb334e2ed637fdb9e4bf0b605faa805f5e6a3a00cbba7886a603ec94c8209f73fd82aa390d1da1b0dbf4598a0b94a41